Three groups: Activity linked to LABYRINTH CHOLLIMA now maps to three distinct adversaries.
Focus: Two groups prioritize cryptocurrency revenue, while core operations remain focused on espionage.
Shared infrastructure: The groups continue sharing tools, malware frameworks, and operational tradecraft.
A new threat research has found that threat actors tracked as LABYRINTH CHOLLIMA involve three groups coordinating with varying focuses on revenue generation and cyber espionage.
Researchers tracked GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and LABYRINTH CHOLLIMA with distinct malware, objectives, and tradecraft, while sharing infrastructure and tools.
GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and LABYRINTH CHOLLIMA Objectives
Researchers assess that LABYRINTH CHOLLIMA activity traces back to the KorDLL malware which was active between 2009 and 2015. They later led to the development of malware families like Dozer, Brambul, Joanap, KorDLL Bot, and Koredos, before evolving into the Hawup and TwoPence frameworks.
The Hawup framework is an espionage-focused malware toolset linked to LABYRINTH CHOLLIMA.Â
Operation and Structure
The three subgroups emerged from the Hawup framework between 2018 and 2020. The following structure shows the groups’ operations with origins and missions.
LABYRINTH CHOLLIMA
Cyber espionage operations
Targets industrial, logistics, and defense organizations in Europe, the U.S., Japan, and Italy
Uses malware with a Hoplight lineage
Employment-themed social engineering, zero-day exploitation and WhatsApp-delivered malicious ZIP files
GOLDEN CHOLLIMA
Focuses on cryptocurrency and fintech entities across the U.S., Canada, South Korea, India, and Western Europe.
Conducts theft operations
Uses malware frameworks such as Jeus and AppleJeus via duplicate cryptocurrency applications
Observed leveraging Chromium zero-day exploits, including SnakeBaker and NodalBaker
Cloud-focused tradecraft, including IAM abuse following recruitment fraud
Enable stricter restrictions around defense and manufacturing environments
Monitor and prevent WhatsApp and messaging-platform file transfers, carrying ZIP archives containing trojanized applications.
GOLDEN CHOLLIMA
Vet third-party and open-source Node.js and Python packages
Monitor cloud IAM, privilege changes, and cryptocurrency wallet activity
Promptly block execution of unverified cryptocurrency-related applications
PRESSURE CHOLLIMA
Enforce multi-signature and time-locked cryptocurrency transfers
Monitor for low-prevalence implants and suspicious outbound connections
Isolate digital asset infrastructure from corporate networks
Implement transaction monitoring and alerting thresholds for large or anomalous cryptocurrency transfers.
For organizations, it is important to pay closer attention to how software is introduced into the environment,particularly through third-party packages. Greater visibility into cloud and identity activity after an intrusion is also critical.Â
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: